Tuesday, March 31, 2009

Microsoft Encarta buried.

The Encarta Encyclopedia has made the fight against knowledge Wikipedia giant abandoned: even in this half of Microsoft stopped production of its software and closes by the end of 2009 all online spending.

 


At the beginning of the nineties there was a revolution, who wanted to know when the Thirty Years War ended (October 24, 1648), how many wives Henry VIII had (six), or what today happened in 1889 (in Paris, the work on the Eiffel Tower completed), was no longer on the handle to the bookshelf instructed.


Microsoft Encarta Encyclopedia: At the end of 2009 is final


There is no searching for the right band Lexicon, no scrolling through pages worn more. Just a few clicks and you already had the desired result prior to the screen. With Microsoft's encyclopedia software
Encarta suddenly everything seemed so easy.

16 years and numerous language versions later
Microsoft has announced that by the end of 2009 the entire Encarta series is set. Already in June, the software products Microsoft Student and Encarta Premium not to buy, only updates are still available as long as it is the online Encarta is. This is at 31 October finally from the grid - with the exception of Japan Encarta, which has a grace period until 31 December 2009. Subscribers of a premium version but should get back their money, says the Encarta Web site.

1993 appeared the first time a CD-ROM with Encarta software. When the conquest of the Internet began, were soon all information made available online. According to the
Encarta encyclopedia entry on its own came in 1995 a hybrid CD-ROM version on the market, one a month - even a week later - with online content was updated.

But the popularity of software-based Encarta fell. The once-groundbreaking lexicon software from Microsoft has - like the Encyclopaedia Britannica - gradually lost their significance, the ever popular online encyclopedia Wikipedia has been. Wikipedia offers significantly more article topics, some of which are extensive and current than the Encarta contributions made by an editorial team to maintain, by far smaller than the huge army of volunteers Wikipedia authors.


The English-language Wikipedia entry on the Encarta is - how should it be otherwise - already on the latest standard

Monday, March 30, 2009

Tibetans in exile want to better protect against data espionage.

The more sensitive the information that is exchanged, the more important is a good protection for the computer. Like the Tibetans in exile after the attack by a hacker network, upgrade its technology. U.S. authorities meanwhile shroud is about possible damage in silence.

 

According to hacker attacks on computers of the Dalai Lama to the Tibetans in exile will lead to better protect against data espionage. We will now try the system safer, said the spokesman of the Tibetan government in exile, Thubten Samphel, the news agency AFP, "but we have limited funds available."


AP
Dalai Lama: The computers of the Tibetan religious leader and his followers will finally be safe


On the weekend had become known that an espionage network for two years by the computer authorities and private citizens has ausgespäht worldwide, including computers of the Dalai Lama in India, Brussels, London and New York. A total of about 1300 computers in 113 countries affected, up to one third of them were high-ranking foreign targets such as ministries, embassies and non-governmental organizations, said the experts.

The investigation of the Munk Center for International Studies at the University of Toronto had worried members of the Tibetan government in exile ordered. The experts then searched for specific malicious software on potentially vulnerable computers, provided it finds that the many computers were infected, so that hackers gain access to confidential information could provide. A spokesman for the Chinese Embassy in London did the report from Canada, however, as part of a propaganda campaign.

ON THE INTERNET

"The dragon sniffing ': Cyber espionage trial of the Computer Laboratory, University of Cambridge

"Tracking Ghostnet": Report on Chinese cyber espionage Information Warfare Monitor

blogs ONLINE is not responsible for the content of external internet sites.

While the experts as GhostNet (ghost net) described the attacker network located in China. That the government in Beijing after the hacker attack is, however, was from the available information can not be deduced. Roger Faligot other hand, a French writer and expert on the Chinese secret service, said to AFP, the technical details showed the participation of the Chinese state.

On the list of infected computers are among others the German Embassy in Australia. The local authorities have as yet no estimate concerning the extent to which Germany or German missions abroad by GhostNet activities could be affected. A spokeswoman for the Constitution of Budesamt (BFV), at the request of the AP only, the case confirms previous suspicions. Specific details would not make it until the investigation from Toronto is not known in detail. The relevant question for the Foreign Office has not yet spoken to the study.

After publication of the Constitutional by the end of 2008 on espionage, Germany is among others due to its role in the EU and NATO is an important target for the intelligence services of some states. "The main carrier of espionage activities", the Russian Federation, said the report - and also the People's Republic of China.


Old-fashioned hacker


For their espionage attacks seem to be the unknown hacker is not a particularly sophisticated methods used to have. "This is technology at the level of a decade ago," said the IT security expert Christoph Fischer dpa. The spies were presumably through a vulnerability in the PDF format documents into the foreign computer intrusion.

They would have Trojans on infected e-mails introduced and given access to the computers provide. The most effective tool is "the art of social engineering," said Fischer. This manipulation of the persons referred to them specifically to certain acts or, for example, for release of information to move. The fact that the attackers stimulus-specific terms in the subject line would be the e-mail attachments have been involuntarily clicked. "The trick is, with the subject line does not generate distrust."

Sunday, March 29, 2009

The dragon sniffs, where he can.

IT security experts want a hacker group on the track came to be the host of authorities, organizations and governments in 103 countries have cracked. Whether a state behind it can not prove - but from where the attacks came: from China.

 


Toronto / Cambridge - It all started when employees of the Dalai Lama asked whether she was bugged or their e-mails would be intercepted. Cause for concern had the emailed invitation to a meeting with the Tibetan religious leader to one where diplomats. The Tibetans want a call back up, but the political opponent was faster: When the staff of the Dalai Lama durchkamen, Chinese unknown caller had already been there before possible diplomatic consequences of a meeting warned. The suspect was so close: As someone read the e-mail traffic with.


REUTERS
Dragon: The mythical beast in China is a lucky symbol. "The dragon sniffing," is the title of a study on cyber-espionage, on the other hand, had bad luck: He was caught


Technically, it's no problem. One must assume that the global flow of electronic communications of a number of nations the legal authority or simply illegal eavesdropping is that e-mail filters, according to specific keywords are searched. Unencrypted e-mails are comparable with postcards: Who gets into the hand, it can also read.


E-communication is insecure


This is in international communications traffic mostly illegal, but is still widely done. Embarrassingly had become known at the beginning of the millennium as the EcholoN project of Americans, Britons and others who are also its European allies ausspionierten extensively and thus obtained their knowledge in proven cases, businesses were given to those advantages over EU company. Electronic Industrial espionage is everyday, e-mail monitoring as a tool of terror prevention legitimized in the West disseminated.

Unusually, however, is the extent of espionage attacks on the Canadian and British researchers at the Information Warfare Monitor encountered as they began the attacks on suspected espionage Tibetan organizations to investigate. Because they were not only successful, but - as are two reports published on the Sunday shows - even on the computers of government authorities, ministries, embassies and NGOs from 103 countries. Because the "Ghostnet" as the researchers spy-hacker baptized, heard not only lines, but infiltrated computer with all sorts of harmful and sniffer programs that the current repertoire made.


Burglary by Hack


Thus the IT experts of the largest ever publicly made espionage action with sniffer programs, phishing attacks and e-mail attachments introduced backdoor programs came on the track. Thousands, partly as a measure secret documents had been stolen, including from the offices of the Dalai Lama. Introduced were sniffing programs preferably by e-mail, masked as a helper applications or factual communication.

Ten months, the researchers needed by the SecDev Group, the University of Toronto and Cambridge University for their inventory. At the end were cracked in 1295, partly foreign-controlled computers, among others in the foreign ministries of Iran, the Philippines, from Bangladesh, Indonesia, Latvia and others. Infiltrated computers were also in embassies, including India, South Korea, Pakistan, Thailand and Taiwan, but also from Romania, Portugal, Cyprus, Malta - and Germany.

ON THE INTERNET

"The dragon sniffing ': Cyber espionage trial of the Computer Laboratory, University of Cambridge

"Tracking Ghostnet": Report on Chinese cyber espionage Information Warfare Monitor

blogs ONLINE is not responsible for the content of external internet sites.

Whoever since sniffs, did it wherever he could. An analysis of IT professionals do not identify the author of the attacks - they just make it clear where they came from: The hacks, spam waves, targeted phishing attacks and viruses sent waves were therefore "almost exclusively from computers in China" from. An entanglement of the Chinese government could not prove, however, reported the New York Times on Sunday.

The studies of researchers from the Munk Center for International Studies at the University of Toronto and from the computer laboratory at the University of Cambridge have now been made public and can be downloaded (see link at the top left box).

Thus Photoshop beauties.

Art pieces with digital stressed on key sexual stimuli - so see the titles of some TV pictures from magazines. Image guru Doc Baumann shows, photo editors such as Photoshop beings construct.

 


Digital cosmetic surgery, deep necklines, bare skin, large - to construct this pattern many TV listings magazines for years its title photos.


FOUND IN ...

DOCMA 3 / 2009

Doc Baumann's Magazine for Digital Imaging


Issue & Free Subscription
www.docma.info
DOCMA Award 2009 "image forgery"


These images were originally photographed as models often have little to do, like the stylish model with her oily natural state.

Two jumps in other words, people from the exciting art products, which mainly consists of personalized key sexual stimuli exist.

If, because we have thought. So I looked at with the permission of Calvin Hollywood's handling of a finished product for the look of the TV magazines again made the idealized facial features and a section with content hinzugemogelt, on many a TV magazine would be proud of.


New faces, new décolleté, new look - designed Doc Baumann a title picture in the look of the TV magazines.

Friday, March 27, 2009

"I appreciate Facebook.

Actually known privacy expert Peter Schaar for his critical remarks about exhibitionism in social networks. Now it has even a Facebook profile. Just that someone has eaten a pizza, he wants to continue but do not know.

 

blogs ONLINE: Mr. Schaar, you are in the online network Facebook registered. That sounds unusual for a data protection ...

Peter Schaar: I think I'm the only official data protection officers in Germany, which is registered in Facebook. My concern is mainly the portal to know, to experiment with virtual experiences and practices to make. There are not only sensitive information about me available, but my messages refer principally to Professional. I have certainly appreciate Facebook. Sometimes I am busy but also on such services.


blogs ONLINE: What?


Schaar: For example, over the complete irrelevance of much of what it is set. There are three types of contributions: once a very personal, when you communicate, how you feel and what you is doing. That one just ate a pizza and have it handled by a not so well received is. It has helped me not really from stool.

Then there are the politicians' accounts, from balloons, and where I sometimes have the feeling they have not even written. But there is also a third type of contributions, which I take seriously. Because participants have a concern and take advantage of the medium, so as to be exchange, and discuss appointments to meet. For me, this is a useful complement to other forms of communication.


blogs ONLINE: dislike you more in social networks?


Schaar: What bothers me most is the thoughtlessness with which such services and use personal information posted on the internet. This is especially the case among young people, but not limited to them. The lightness and spontaneity of the communications practice for many an enormous attraction. In particular children and young people often do not distinguish whether they are in a virtual or a real space stop and give it often inadvertently disclose their privacy.


blogs ONLINE: Is that a reason that staff in companies with more tolerance information from the network call?


Schaar: Absolutely. Among the many personal information on the Internet, are often those which we commonly refer to as compromising. Because it makes for staff, for example, no sense to someone because of party pictures for unsuited to hold while the person who creates it, not oblivion, as a model candidate appears. If the economy as a selection criterion considered, it is even a leg. Regardless, I but by the networks, their preferences in such a way that not all the world to private data. That is not the case. The default settings are present in almost all networks datenschutzunfreundlich.


blogs ONLINE: Now we recognize that privacy is not only on the Internet is needed. Where are lurking in your opinion more privacy risks: on-or offline?


Schaar: The Internet has for the privacy heralded a new era, but of course the actual risks are still predominantly in the real world. Let us take the work: The employer can always learn more about its employees learn - and not just by them personally interviewed or work inspected results, but by using his computer to work was observed. Perhaps this will happen even without the workers there say. Programs that secretly and to record in detail how the PC is used and the results covertly over the internet, unfortunately, are a big seller. This shows that the Internet is not the cause of privacy problems, but they tightened up and we have data protector with great challenges.


blogs ONLINE: In Germany, this form of illegal spying. In Finland, however, is just a law came into force, the workers are allowed, the e-mails of their employees to review. Because of the pressure from Nokia, it will also
"Lex Nokia '. Is such a thing even possible in Germany?


Schaar: I think it at least for currently entirely excluded that such a law in politics or society we would find agreement. Even in the U.S., this form of surveillance in the workplace very widespread, and also permitted. The fact that the now hold in Europe, I find highly problematic.

MAJOR PROJECTS OF THE MARGINS OF STATE

Data Retention

DPA


Since the beginning of 2008, telecom companies store for six months, who's with whom, how long and from where mailed or telephone (mobile / landline) has used the Internet or send faxes has. For Internet service providers, providers of VoIP telephony and e-mail services, the memory requirement of 2009. They should record who when under what IP addresses using the Internet, to whom he e-mails sent and by whom, what he has received. more on blogs KNOW

Federal Trojan

DPA


Federal Interior Minister Wolfgang Schäuble (CDU) wants the Bundeskriminalamt allow computers of suspects secretly by Trojan software to browse, e-mail log files to evaluate. About the planned revision of the BKA Act denies the Government coalition. The software seems to be ready for use: In August 2007, the Ministry of Interior Schäuble of the SPD Parliamentary Group in writing of the so-called "Remote Forensic Software '(Fernforensische software," RFS) could be "a repeal of the currently available development stops immediately completed" his. There were already "part of modules completed. In a ruling on the constitutional protection law of North Rhine-Westphalia continued Verassungsrichter Karlsruhe in the use of such methods at the end of February 2008 limits. more on blogs KNOW

Biometric passport

DPA


Since November 2007, the German registration offices only e-passports of the so-called second generation: In a tiny radio chip in the passport are the finger prints of both index fingers saved? two years since German passports contain a digital version of the passport. Experts criticize the biometrics passport: The passport itself can not determine whether the key of a reader is valid. If the key once cracked, can not be retrofitted. Today, the key is hardly knackbar? but it could in a few years of computing power available quite different. Another risk: Germany, other countries need to read the key pass. What kind of data actually read these countries, whether they save, how they use and protect, Germany can not control. Peter Schaar, Federal Data Protection Officer: "These data could therefore persons into databases." more on blogs KNOW

Electronic health card


2009, a new nationwide health insurance card should be introduced. 30,000 insured test the memory card into seven regions today. A memory chip on the card is initially base data such as name, address, health insurance save, if the patients want it, including emergency information such as blood. Subsequently, the chip but the access to stored on central computers allow digital medical records? here should be controlled by the patient, details of illnesses, injuries, treatments, doctor visits and therapy are stored. In particular, the storage of personal data to central computers makes data protection concerns: Dietmar Müller, spokesman for the Federal Data Protection Commissioner, said in the spring of the Hamburger Abendblatt: "We have reservations with the electronic health card. For privacy, it is a problem if patient data on central storage servers. " Because the data is first collected centrally, it grows not only the risk of hack? Such databases can also be demands fo!
r more analysis options awaken. more on blogs KNOW


blogs ONLINE: Nevertheless, it also happens here time and again that their employees spying. Are the penalties on the disregard of the Data Protection Act are not deterrent enough?


Schaar: The Secret Spying on employees is a violation of the law. As for other privacy violations, the Federal Privacy Act fines and, in particularly serious cases, prison sentences. There are also corresponding fines and criminal proceedings, but only a few final judgments. In comparison to what happens - and I go here by a high number of -, the proportion of judgments negligible.

This is partly due to the fact that the authorities shy away from the instruments to be applied. Another reason is the imperfect laws. The fines are in some cases too low. They take into account, for example, has not yet been the emergence of profits from data misuse. And there is a legal patchwork in Germany and in Europe.

Thursday, March 26, 2009

One in four British database disregards privacy rights.

Many state databases are in Britain, according to a recent study may be illegal. They violate human rights and privacy. Experts call for now, the affected data to an end and to reform the system.

 


A quarter of all databases of the British government is an expert report illegal. The
Joseph Rowntree Reform Trust (JRRT) presented in a study published now
(PDF) serious safety deficiencies and violations of human rights and urged that the illegal data to conclude or to reform it.

46 databases, the state-party independent trust as part of its study. Just once in six cases, the privacy of citizens are adequately protected, according to the experts. The traffic light rating of JRRT, despite concerns among other things, the national fingerprint database and the TV licensing system of government the green light get BBC.


REUTERS
Supervision: For their databases, the British government pays each year billions of pounds


For eleven databases, however, there was a clear red, including the National DNA database or Contact Point, a database to gather biographical and social information of newborns. "The databases culture of the state must urgently and radically revised," says Ross Anderson, Professor of Security Engineering at the University of Cambridge, one of the authors of the study JRRT. In addition, the Trust complains that every year 16 billion pounds for the dubious schemes spent.

The opposition has criticized the connected. Eleanor Laing, spokeswoman for the legal and political conservatives, said the government urgently needed more consideration to privacy and consent of citizens to save for the premise to make. Your Party promises in the case of a reelection next year, Contact Point and the announced by JRRT also disputed ID cards should be abolished.

However, a spokesman for the Justice Ministry rejected the accusations. There was no substantiated evidence of the illegality of the databases. "The Government takes its responsibilities seriously will consider any concerns and if necessary adapt existing security arrangements," he said to BBC News.

The British government stores in numerous databases, information on the citizens. With regard to the protection of British thought, it is many pages again and again to be too broadly criticized.
Just be aware that the government is now also Vorratsdatenspeicherung on Social Networks and chats will expand.

The Mist-law of onanism Order.

So funny word can be: porn movie instead portfolio, contract whores instead of contractions - when software texts, goes something wrong. Absurd suggestions readers have sent their programs. blogs ONLINE cases shows the funniest comedy of correction.

 


Mike Calcagno at Microsoft has a job with "real power", writes the Seattle Times. " Because Calcagno decides as manager of the Natural Language Group "ultimately about what words and proper names in the dictionaries in Microsoft's software and supplies which are not. The last name Obama, for example, knew the spelling checker for Microsoft Word is not until early 2007. And so with every word motzte Obama in a text, and presented a proposal absurd Correction: Osama.


A letter will be exchanged only - for the correct software is a Vertipper so close and the likelihood that the stored in the dictionary was meant Osama is in the program logic is very high. The meaning is, of course, a radically different, but that recognize only human. Because the difference was so striking, said Microsoft in 2007 dictionaries from Office 2003 and 2007 for Obama.

The German versions of Microsoft Word 2002 and Mac Word 2008, however, supply is still curious correction proposals for Barack Obama: Baroque, the U.S. president to say, the software.

About this correction comedy
ONLINE blogs reported. Readers sent the correction absurd suggestions that they auto-correction software in everyday life makes --
Mist-Law, Order of onanism, coffin-key everything.


Who on the Web these creative neologisms correction software will find many apparently hastily corrected by automatic full of great articles, as entirely unintentional comedy. Since then stands on one side, for example, association of this sentence: "Is work-life balance-something the company promotes, eg homo-office, flexible working hours, childcare facilities, etc."? That was certainly the home office, home office and called Word likes to "homo-office" corrected.


COLUMN SUBSCRIBE

Malfunction - Technology quirks, the millions of nerves
Click on the icon, then your browser is usually linked to the RSS feed as well. Problems? Help ...
Or would you prefer via e-mail to be informed? Free email service with each new column to - how it works, click here ...
RSS feed of this column: http://www.blogs.de/netzwelt/tech/k- 7334.rss

Such errors linguists call the Cupertino effect. An old version of Microsoft Word word processor probably improved for a time in the English text input "cooperation" through "Cupertino" - the Californian city where Apple's headquarters sits. Even today there are hundreds of Cupertinos on the web pages of NATO, UN and EU documents, which actually quite sure of the cooperation speech should be.

The American linguist Benjamin room has researched this amazing error. He does not believe that people in the foreseeable future can stop the correction proposals of programs to examine the dictionaries and the software itself, where appropriate, add: "Despite the developments of Microsoft and other software providers can correct programs never be perfect." Especially great were the problems with proper names and foreign words. Rooms: After 11 September 2001, for example, adding Microsoft Office dictionary to Osama, and then no one could predict that Obama was once a major name would be. "

Ultimately, people always need the correction proposals of the software review, says Zimmer. Solo: "Unfortunately, we are always careful and not leave us too much on our technology." Thankfully, or else someone would have never been on the "villain inquiry" can laugh.


WHAT YOU TECHNIKÄRGERNIS nervt? WRITE TO U.S.!


Hidden Einschaltknöpfe, confusing instructions, crazy machines - in the series "malfunction" in bulk, we follow Technikärgernisse to the millions of nerves. Send us your suggestions with a brief explanatory note. The best e-mail.

Tuesday, March 24, 2009

Last browser standing.

It's about more than fame and glory: The three competition Pwn2Own try hacking the latest web browsers and mobile phones to crack. Who creates it, are money and gadgets once wealthy. At the end of resistance, only one browser to the attacks of hackers sports.

 


When was the first safari. Only a few seconds it took until Charlie Miller is the Apple browser subject had made. But Miller was also well prepared. Already one month earlier he had announced his intention, his Hacksoftware prepared. The fact that Apple is in this period failed to provide security to plug loopholes through which Miller in the browser wanted to penetrate, has a simple reason: If he finds such a gap, Miller retains his findings for themselves.


Web browser as a sportive target for hackers: Only one was held


"Vulnerabilities have a market value. It would be pointless to take the trouble to make a gap and broke to publish his findings," says Miller to
ZDNet and adds: "Apple people paid for this work, so this work must be worth something."

This is not quite the work ethic of white-hat hacker who traditionally their findings to the affected companies, their hacks so as a contribution to the security of the IT world. Indirectly, however, Miller is doing the same - he wants it just do not volunteer.

Particularly rewarding because it is such vulnerabilities to use to the hacking competition Pwn2Own participate annually in the framework of the Security Conferences
CanSecWest place. Who participates therein may triple win. For one, the winner's glory and honor sure to wave to other cash prizes. And finally, we must, if successful, the device that you have hacked, also take away. Just as Charlie Miller, who this year for the second time in this way to a brand new Macbook came - and additional $ 5000 prize money einsteckte.


All phones have remained steadfast


What you had to make to adapt to this way, a new gadget to work, was approved by the competition management previously defined. Who, when and in what order his arts could perform certain the Lostrommel. The pole position secured advantages here, because only the first to overcome a hurdle, equipment and money was pressed. Subsequent attempts were successful only with a disdainful Mammon rewarded. But even that worth it. For each exposes computer security hole, there was $ 5000, disclosed security vulnerabilities on mobile phones should do with $ 10,000 paid.

But so far there was not. Three days long toiled in mobile phone specialists to provide mobile phones from. A total of five different devices were the choice for hackers, a BlackBerry, a T-Mobile G1 an iPhone, a Nokia N95 and an HTC Touch. But to crack, no-show succeeded programmer. At the end they had all their old mobile phones, and without extra holiday to go home. The mobile phone manufacturers were able to knock on the shoulders.

Whether this will remain so, however, is questionable. Apparently there was this year only a few serious attempts to adapt to the mobile phones to make. That could be next year already look quite different when the competition - and especially the prize money - in the scene have a better round.


IE8 was killed before its publication


On the PC hacker on the other hand, it has long been spread that the participation in the competition Pwn2Own can pay off. On a Windows machine, the security mechanisms of the supposedly most secure Internet Explorer 8, Firefox and Chrome overcome, stood on Mac Safari and Firefox on the election. At the end of the competition it was 4:0 for the hackers. Until Google's Chrome browser leckgeschlagen were all made it to the participants of the competition, the control over the computer to take over.

One of these leaks could also be applied to Chrome. Because of Google's browser in a special way with the operating system of the PC together, it was not the hackers, in this way the whole PC to capture. Quite different, however, saw the new Microsoft browser. The IE8 ordered a hacker before its official publication.


It was worth it


The specialist, who simply described as the Nile, walked with ease on Microsoft's new security mechanisms DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization), gained in this way access to the Vaio laptop that he also was allowed to go. Still, Microsoft's expert responded immediately stopped the leak by Nils utilized within twelve hours, a record-breaking response. Apparently it was prepared in Redmond.

But the winner of the day remained Nile. Shortly after he had cracked the IE8 he is still in the Windows versions of Firefox and Safari before, with success. So he could at the end of the day is not only a new notebook, but also take away $ 15,000. As another saying that it would not be rewarded for the good guys to hack.

Man, do the lights!.

One and a half years after the first Earth Hour is WWF tries again and asks the people around the world to light on Saturday by a sign of climate change must be set. UN Secretary-General Ban Ki Moon supports the action, critics believe that it is counter-productive.

 


The idea of
Earth Hour is deceptively simple and harvested at their first trial in 2007, a significant media coverage, though little success: for an hour, called the World Wild Fund for Nature (WWF), should the people in the world, cities and businesses should just make the light, a sign of climate change must be set. In Germany, made the "Picture" then audition for the local "
Action of light, "and thus not only won applause.


www.lichtaus.info: Symbolic Action for Climate Protection


Indeed, at least as much attention was the "
Action to light, "the WWF publikumsträchtigen Action vorhielt on symbols rather than on delivering results. For the critics of Earth Hour is nothing more than a feel-good action, in which all feel a bit more active can - instead of really doing anything. A kind of political climate for trade Drain discharge of one's own conscience. Numerous environmental groups and civic organizations by Robin Wood on Nabu to attac and "taz" asked about "light on! - But right "instead of only for one hour to remove the pears, should you prefer one of them against an energy-saving lamp exchange.


The second experiment: movement needs icons


There are two disputing parties, who actually wanted the same and looks the same again this year: On Saturday, the 28th March, if it is according to the organizers of Earth Hour is from 19:30 clock to the world the lights go out in the cities. Even the criticism made here by "Our climate savior," is identical: "It makes sense as the light is off, the climate savior, the brain on. Instead of focusing on the action to participate, each Hamburger buy an energy saving bulb and a light bulb exchange."

Applications for Earth Hour, Stand 24.3.2009, 13 clock: In the alleged eco-pioneering country Germany is hardly the action of interest. While the other characters unthinkingly put runs the debate, but also a little noticed

Hamburg is one of the few cities in Germany, by a so-far as possible implemented darkening their characters want. Worldwide, says the WWF, have so far 2398 cities in 83 countries indicated that they wanted to be there. Want to save electricity on Saturday evening 5481 organizations and 18,783 companies.

One good thing is that costs nothing, save a little bit and - as critics have of course - something neither causes nor hurt anyone: Of course, it is unlikely that very many officials and employees on Saturday evening at 19.30 clock in the office because of darkness their work will be interrupted. In that respect the Earth Hour is nothing more than a symbol, but this is something you need sometimes also argued WWF Chef Eberhard Brandes in advance: You need a global movement for climate policy to the appropriate pressure to make.

Because he is right, and movements need rituals: Because the handle is on the light switch in line. Who on earth still more than an hour to treat, replace the bulb - to handle warm temperature cools - the same clock at 20.30 against a lamp or LED energy saving lamp. Does not hurt and takes longer.

Monday, March 23, 2009

Privacy policy reform in rowing back.

Where the federal government backed off from the Data? Last year, they have a better protection of consumer data promised. Now the industry fears about jobs and income - the Bundestag discusses a defusing of the proposed laws.

 


The internal committee of the Bundestag today deals with the proposed law against data misuse. According to the company now also ask leaders of the SPD and the Union, that the draft presented in December for a better protection of consumer data is defused.


Corbis
After the recent scandals: consumption data should be better protected


After last year, numerous cases of illegal trade with records were known, announced the federal government, the federal Privacy Act to be extended. It requires the user to transfer his data for advertising purposes will explicitly agree. Previously customers had only the possibility of a transfer to explicitly contradict one another. One option which was exercised only rarely.

Publishers, mail order companies, banks and insurers, and researchers think are against the amendment privacy storm. They were afraid of job losses and tax losses. Without address lists across industries would form the backbone broken, lobbyists said. After receipt of the bill reached the Bundestag a flood of protest letters. Union Franktionsvize Wolfgang Bosbach (CDU) told the New Osnabrücker newspaper (NOZ), which entitle the concerns of the economy should be taken seriously.

Should the draft in its original form through, consumers, businesses, the data only with written consent to do so solely for their own advertising is no approval necessary. This deprives the new economy, the basis for canvassing, so Union interior expert Hans-Peter Uhl (CSU) in the NOZ.

While some politicians promote it, to find a solution, both for the sectors is satisfactory, as well as the privacy expectations, warns the chairman of the Interior Committee in the Bundestag, Sebastian Edathy (SPD), prior to major concessions to the economy. "Details about the design you will be able to talk, in doubt, but the consumer must have priority," said Edathy. The coalition must stand on its promise, after the recent privacy scandals about a paradigm shift to happen.

At today's hearing the Bundestag, the head of the Independent Center for Privacy Protection Schleswig-Holstein (ULD), Dr. Thilo Weichert, participated as an expert. He believes the changes would not hurt the economy. Would be reached with the law expected exactly the opposite: "an intensified and enhanced dialogue between consumers and the economy."

Behördenruf 115 takes pilot operation.

What police and fire work, is now also dealing with authorities. Under the nationwide uniform number 115 in the future, citizens questions. From Tuesday the system can be in four states tested.

 


What documentation do I need to marry? How do I report a business or to request a tax card? When will the garbage disposal? Who the competent authority for certain services of public administration, or simply does not know several of these issues at once would like to have answered, is now on a single phone call to the number 115 get answers. The single phone authorities to launch on Tuesday in Sydney, Berlin, Hamburg, the city of Oldenburg, as well as parts of North Rhine-Westphalia its pilot operation.


DPA
Authorities Number 115: Should the future communication with the public administration simplified


"We love questions," encouraged the project "D115" in his official flyer potential callers. The single phone number is initially for the ten million inhabitants of the model regions a direct line to management and administrative levels at the same time connect. Had, for example Bafög been interested in municipal, or federal land use - depending on whether students, prospective student or master craftsmen - it should be "flat across" the 115 as the first point of call is available. It is open Monday to Friday from 8 clock to 18 clock.

The idea for the uniform number Authorities was established on an IT-summit of the federal government nearly two and a half years. For its implementation are now existing - mostly local - service network. Even in the two-year trial run will gradually add other regions. All the 115-service use a common knowledge management system, which includes the 150 most common questions together with citizens' answers are recorded, including 25 each concern, the state and federal authorities. The list will be as specified by the responsible Federal Ministry of Interior constantly updated and expanded.


Easy but not free


Gets a caller in the 115 to his question in the nearest service center is not an immediate response and will take up his concerns, for example, of an expert authority, he should within 24 hours receive a callback. Also a reply by e-mail or fax is available. The majority of the questions - according to the Ministry of Interior at least 55 percent - but directly at the first contact to be answered.

In other countries there are already models for a single phone number authorities, for example, "Allo Service Public 3939" in France. Also in Germany is a telephone service over a number of management levels is not new. For example, since 2005 the "Hamburg-service" with a single phone wire as a local and provincial administration. A central service number on all levels in a federal state is across the federal Interior Ministry, however, that a novelty.

Unlike calls to the equally succinct three-numbers 110 and 112 for emergency calls is the collection of information about authorities not the 115 free. From the Land of the fall, according to industry service providers, depending on the Teltarif seven to twelve cents per minute. Who from the mobile network calls, therefore, pays up to 50 cents per minute.

Teltarif on Monday criticized a lack of transparency on the part of suppliers and the absence of a statutory duty to announce tariff for 115-Call. Given the sometimes rather high per-minute prices, announced that the "quick and competent treatment from a consumer perspective is essential," said the service sector.

The laser reads with.

Trojan software? Phishing? All too complicated. With a laser eavesdropping, researchers can sound of the letters on each key detect. Passwords and account numbers could be so much easier to capture than before.

 


Who a computer user's passwords will elicit, mostly by trying the software. So-called keyboard sniffer software (also loosely called keyloggers) registered every keystroke, send their recordings via the Web at Lauscher. But how do you get the sniffing software on the PC? By the victim collapses, the software is installed by hand? Or by trojan program that is on the computers of the target person einschleust? Both methods are expensive, take time and can take appropriate security measures difficult or even prevented.


DPA
Lauschangriff: By laser microphone Keystrokes can also be intercepted and decoded are


Two much simpler, faster and yet also cheap interception methods now have the engineers of the British security firm
Inverse Path developed. At the security conference
CanSecWest in Vancouver, Canada, demonstrated Andrea Barisani and Daniele Bianco, how Keystrokes abhorchen by laser or the power grid can erschnüffeln.

Almost like a proposal for "Wetten dass?" their method appears, clicks on the sound to see. To the clicking of the keys to eavesdrop, the researchers used a so-called laser microphone. Normally such devices are known only from intelligence thrillers. In those spies hear their opponents through windows closed to through it. The trick: These microphones are so sensitive that even the minimal vibration record into which the sound of a conversation puts a window. The technique includes the repertoire of police investigators.


High-tech attack for 60 euros


Barisani and Bianco have a mic now so modified that it also works through windows and through the clicks of a PC or notebook registered. A software that works like a similar text program, extrapolated from the respective clicking sounds, which key was just pressed, similar to their results with a dictionary and try it, meaningful words together. Overall, according to the researchers, the equipment costs for such a high-tech attack just $ 80, so not even 60 euro.

Slightly more expensive on the other hand, could intercept the second variant, which the two at the security conference imagined. With an oscilloscope it investigated current fluctuations in an electrical outlet, which is 50 meters away from the PC abzuhörenden was appropriate. Letters or even whole words, the eavesdropper in this way does not recognize, but still identify individual keystrokes. Researchers are optimistic, however, even this hurdle will soon be able to.

At least the latter method, however, there is an equally simple as widespread repellent. Because the method only works with keyboards that have outdated PS/2-Buchse to the PC. Once you have a USB keyboard or the keypad of a notebook is used, before such tests therefore immune from eavesdropping. There are so not. Finally, researchers at the University of Saarbrücken already developed a system by which the contents of a screen whose
Reflections on a coffee cup can be reconstructed.

Had become necessary to develop this technology until the advent of LCD Monitors: Traditional CRT monitors emit so hard that her image even from a respectable distance even through walls and reconstruct observed.

Friday, March 20, 2009

Netbook for children.

The boom in new Netbook calling players on the plan: Now also tried the Archos company, previously better known for noble Media Player on the market for mini-computers. The French are relying on a niche approach - and advertise with design, price and compatibility for children.

 


The French company Archos is without question one of the pioneers in the multimedia device developers. Years before Apple and Co. threw the company MP3 player, and later multimedia devices on the market, the standards set. Machine such as the Jukebox 6000 (on the market in 2000, 350 grams heavy, 6 GB of storage) which would be what was then the iPod: when the boom of MP3 players began, the French had the nose very far forward - and are now just a producer of many.


It was definitely a hands Archos innovation and the occupation of niches. Current mobile multimedia devices by the manufacturer are also car navigators and digital video recorders. His Internet Surftablettchen makes Archos has a fairly inexpensive docking station to the living-room media server and recorders. Part of the offer is extended since the Archos Media Club, a virtual video store, over which the need arises spontaneously movies from the network load, which is then easily on the flat-screen TV land. With such ideas, which ultimately far more coherent, more flexible and more comfortable than many expensive sold media server, Archos has priced its products in the upper midfield established.

Much of it is now also in the latest product of the French, which may represent a risk: How many other Archos has the boom of the Netbook will be captivated, it also once on the truly hard-fought market of mobile mini-computer to try.

Although generally sell like sliced bread, it is not so simple. The narrowly defined specifications Netbook ensure that the products are technically largely correspond to the standard adopted today a Netbook Intel Atom processor with 1.6 GHz clock speed, a 10-inch display, 1 GB of RAM and Windows XP installed on a 160 GB hard drive. Also the Archos 10, the first Netbook of the manufacturer, is no exception.


One must be different


Like many other new players on the market takes about Archos true that its unique features must be defined differently: Who now Netbook this definition brings to the market needs a niche. There are several ways to Archos but only partially responsible for:


Energy: The Netbook of the first generation to suffer all the shortcomings condition - after 1.5 to 2 hours is the juice from them. Newer models use 6-cell battery, the four to nine hours to keep. The Archos 10 shows it with a 3-cell battery (2.5 hours, according to the manufacturer, the test 1.75 hours) and 6-cell battery (5 hours duration)


Interfaces and communication: To the usual Wi-Fi comes in the second generation of Netbook against some juicy extras, the UMTS connection. Archos renounces it, but unfortunately also to a HDMI interface, which some providers now offer (Asus starts at just Nettops, Dell in the next month). This limits the possibility for the Netbook as media server - what naheläge if the connection to the Archos Media Club consider


Price: Here Archos had made in advance, accurate to score points, "massive pressure" (corporate PR) on the market. Then came CES and CeBIT, and suddenly the prices were no longer low. Archos responded consistently and lowered it at the same time as the first product release. The 3-cell battery model cost now 329, the 6-cell model 349 Euro. This is competitive, though not exceptional. Well that's why the more powerful device than current special offer from 318 euros to have the 3-cell device, many dealers do not


Design: Hand on heart, a laptop is a laptop. You can give it different colors, the screen matt or blogsig make it thicker or thinner to make, cheaper or more expensive-looking materials construction. Archos also invented the wheel is not new, but presents a solid looking device with a pleasant rounded edges, which affects quality and presentable. The display is comfortable and sufficiently bright matt A real weakness, however, is the keyboard: The fall is not greater than that of an 8-inch device and is responsible for typing longer texts simply not suitable. This allows many competitors (eg Asus, Medion, MSI, Samsung or LG) is significantly better


Software: The "soft" because of the variable equipment are the preinstalled programs - and this requires the Archos 10 absolutely not to hide. Like most manufacturers Archos continues to Windows XP instead of Linux, and takes the opportunity to expand the hardware (Microsoft Netbook manufacturers committed to the above specifications). For an XP Netbook is the Archos but well equipped photo, internet radio and TV software is one of them, Skype, an office suite of Lotus, virus scanners, and access to streaming music service Deezer and the Archos Media Club. Above all, however, a niche occupied by cleverly Archos: The computer is shipped with a program that filters Internet content and the user with a time budget confronted - the Archos 10 is a "Children's Netbook".

Exactly that was originally also the finder of those mini-computers, the company Asus, advertised on the first promotional pictures of the EEEPC are always children or young women, the small machine. So beginners should Netbook computers or laptops for remote IT.

Abzocke attack on ATMs.

ATMs are safe? Von wegen. In Russia it is apparently criminals managed to make a trojan in bank machines einzuschleusen. Security experts are on the Coup surprised insiders suspect behind the deed.

 


The U.S. machine manufacturer Diebold does not have an easy time. First, the company
because of its voting machines in the criticism, now turn out even its ATMs as vulnerable. The computer security firm Sophos says its experts have been on Diebold machines in Russia, the Trojan Troj / Skim-A were identified. According to Sophos, the malware into the computer ATMs have been introduced to the PINs and bank card numbers of customers' behavior.


DPA
Money from the vending machine: In Russia, such machines have been tampered with by criminals


If the message as correct turn, this would be probably the first serious case in which criminals to users of ATMs are not from outside but from inside, so to speak Abzocke. So far, namely, limited experiments, the data of cash and credit card users to comment, usually to provide additional hardware to install the devices. So are many documented cases in which tiny cameras attached to the machine, which manipulated keypads and additional card readers before the actual input slot in order to map data of the customers to come.

In the current case, the thieves have their own software, a Trojan is to install the ATM, writes Vanja Svájc, senior virus researcher at Sophos, in
SophosLabs blog. The specialist gave himself such attacks so far impossible. As arguments, it is that ATMs

mostly use proprietary operating systems.

even if they use Windows, usually a custom embedded version of Windows is used.

de machines used in the hardware and software is not publicly documented, so it would be very difficult to access a software to find.

ATMs usually only to closed internal networks are connected to the outside no access is possible.

Any attempt to introduce such a device to open and manipulate built sensors would be detected.

The fact that there now appears to have succeeded yet, a Trojan on such devices einzuschleusen concludes Svájc that the attacker access to the machines must have had. Moreover, he made the way the malicious software to manipulate and vending machines are not documented exploits software routines that programmers involved deep knowledge of the Diebold software must have.

As is clear from two documents indicating that Robert McMillan of the
CSO Security website online has its Diebold customers informed about the incident. Moreover, according to the company already suspects have been arrested.

Even German ATM manufacturer would use under Microsoft Windows and are therefore potentially vulnerable to malware infections and manipulations, it is said by Sophos. These attacks on ATM machines were intended for cyber criminals, however much more complex than attacks on computers, because they, for example, a direct, physical access to the machines require. A massive spread of such attacks Abzocke was therefore initially not to fear, calms the company.

Thursday, March 19, 2009

Data call for more security guards on Google services.

In the United States insist on a data protection official examination of Internet-based Google services like Gmail or Google Docs. By the Group for the security of user data can guarantee the tenders should be blocked.

 


Confidential information is not secure in Google - this opinion is in any event, the U.S. Agency Privacy Electronic Privacy Information Center (EPIC). It requires an examination of offerings such as Gmail or Google Docs to privacy precautions. By the Group for the security of the data can guarantee to use Google's services, according to data protection in court should be prohibited.


Google Docs: Data Protector want to use Google's services prefer to lock


Recent events suggested that Google "confidential information is not stored properly," says the
Complaint letter to the U.S. Consumer Trade Commission FTC. We are talking about a security flaw in Google Docs (text and tables) in early March.
As the company was in the official Google Docs Blog conceded, was a small percentage of users briefly on the Google Docs documents other access. The error was quickly corrected.

Google offers various Internet services, also in Germany are widespread. These include the e-mail service Gmail, the calendar in Google Calendar, Picasa image management and even Google Docs. The programs are not installed on the computer that is accessed exclusively over the Internet.

Microsoft published the final version of Internet Explorer 8th

With Internet Explorer 8 will Microsoft in the browser market to make good soil: The program includes the smaller but more innovative competitors to long. Was renewed for the safety, convenience and speed. Published MSIE8 is the finale on Thursday evening.

 


About two months after the publication of the almost finished Microsoft Release Candidate is the first full version of Microsoft Internet Explorer 8, just MSIE8, download free. From about 18 German clock time is
The download is possible.


Competition in the browser: Microsoft sets the MSIE8 - and wants to re-floor is yours


For Microsoft, the publication is an important step in the relegation battle: For years, the company is continuously losing weight in a market a few years ago they almost completely dominated. But Microsoft rested after Netscape's competitors had successfully suppressed, too long on his laurels and developed the MSIE browser is not fast enough to continue. The result: Small competitors like Opera and Netscape emerged from the Mozilla browser, Firefox later Microsoft withdrew them - with a clever innovation, better performance and security.

News MSIE is the world's still around 67 percent and has so within a year lost about eight percent (figures: Net Applications). The trend was highlighted by the publication of the beta versions and release candidate of version 8 is not able to stop.

How many of the innovations in MSIE8 as adjustments to the standards which were set by rivals Microsoft has given a lot to catch up. That the company is so serious, it also shows that they are waived on special ways: As the first Microsoft browser of the Millennium will be on the MSIE8 international Web standards and proprietary specifications to renounce. With which Microsoft had long tried, even the standards on the Web as follows: web designers were forced to their sides for a proper representation in the Internet Explorer adapt.

One last joke from stairs this time: websites, which until today, the MSIE8 now no longer display correctly. Therefore, the software program under the hood, with a MSIE7 emulate it. Microsoft therefore needs a software crutch, so that the sins of the past is not noticeable.

That being said, the company has the software but aufgebohrt force. Especially in the security and speed of Microsoft now wants to score points. According to the company, the browser MSIE8 competition now in many benchmark tests.

New are also functions such as Web Slices, which are part of an offer separately from the rest of the page and watch "subscribe" to. Last Bugs and hook the release candidates will have Microsoft ausgebürstet.

ON TO ONLINE blogs

Internet Explorer 8: Microsoft invents its browser (28.01.2009)

Functional changes, the browser on the other hand, have hardly changed,
blogs ONLINE him since the end of January in a first test presented.

Google Sony donates 500,000 books.

Sony E-Reader is used by Google at a stroke with a huge library equipped. These are books whose copyright has expired, including some novels by Charles Dickens and works from antiquity. The future can be read digitally - for free.

 


Sony E-Reader under the agreement will almost
Amazon's Kindle e-reader can catch up - at least what the size of the digital library are available. For the Kindle, there is currently - in the U.S. - approximately 600,000 books for download.

Sony announced now in the U.S. there will be 500,000 books available for the
house type E-Reader in Europe some less, but still "hundreds of thousands." It was a logical step to attract more people to bring more books to information anywhere and on any device making it available. " The official announcement from Google is still pending - for the Thursday afternoon, a telephone conference.

Google initially announced only that you believe "an open platform for accessing and reading books" and was therefore "always open to discussions with technology partners." You can see a future in which "people everywhere on the planet, the books of the World search, discover and access it can be." Many of the books searchable on Google books have already been using a special software to transfer text files, so that they
Phones with the Google Android operating system can read. Only logical that the files are now other devices available.

According to the Associated Press (AP) are the books which are now in the Reader-compatible format should be made available, all from the period before 1923. Among them were about Charles Dickens' "A Tale of Two Cities" and Herodotus' Histories. "

Even now, the books on Google Books as PDF before. Well, Google works According the AP Epub format (Electronic Publication) available, so that they relate to readers like the Sony Reader is better represented. The files must be downloaded via a PC and from there to the electronic reader transferred. Kindle books are on a wireless connection directly to the device is captured.

The
E-book platform of the German Book Trade, Libreka, currently offers only a modest number of books as PDF downloads. Books in the Epub format but will soon follow. The largest online collection of German literature, the classics
Project Gutenberg - free.

The alliance between Google and Sony expected the Epub format give a powerful thrust. Amazon's Kindle books are in a proprietary format, and can not look at other readers. Also prohibits other vendors Amazon, books in Kindle format to publish.

Wednesday, March 18, 2009

Federal Green-IT is coming - with a delay.

According to Environment Minister Gabriel computing must be environmentally friendly. To Cebit announced his ministry, therefore, a program of support for climate-friendly innovations in IT. Within the ministries of this ambition is yet, very little to be felt.

 


Federal Environment Minister Sigmar Gabriel chose clear words, when he was at the Cebit in Hanover, the funding priority "IT goes green" presented. "The significant increase of greenhouse carbon dioxide emissions, we can only stop if the IT solutions of energy and resource efficient," said Germany's top environmentalists.


Deutsche Messe AG
"Green IT" as it was presented: The federal authorities have in terms of IT environment apparently catching


Until all the federal ministries, this finding seems not to have enforced. Because, as it comes to the energy needs of the computing facilities of the federal authorities are apparently not even know the federal government itself, as is clear from a reply, which the Federal Ministry of Interior to a written request of the German Parliament Angelika Brunkhorst (FDP) formulated.

The question presented itself Brunkhorst, 25 February a. The reply sent by the Federal Ministry of the Interior (BMI), but only on 10 March, two days after the end of the Cebit. Thus, the Ministry of the Environment in Green IT area of the fair yet robust advertising drums for its new funding program to stir. 25 million euros, the ministry prepared to ensure that the development and introduction of innovative technologies, which help to comply with the energy consumption of computer systems to reduce.


The Ministry of Environment saves 44 tonnes of CO2 per year


How this is done, the Environment Ministry itself on exemplary manner. In November 2008 the Authority was able to proudly reported that their computing power by 60 percent to have. Per year would be 70,000 kilowatt hours of electricity saved, representing a reduction of CO2 emissions by around 44 tonnes, that is good for the environment.

Incidentally, but saves the Ministry through the modernization also some euro operating one. Approximately 10,000 to 12,000 euros per year should be a normal commercial customers for the amount of electricity saved now berappen.

Unusual investments are apparently not even necessary. Instead, the impressive reduction in power consumption under a normal investment cycle has been carried out. In plain English: The old hardware in the computer would be kicked out anyway, with new equipment has been replaced.


107 computer, and no energy


The IT manager from the Environment Ministry chose the replacement equipment, however, aware of even after their energy consumption. In addition, we opted for a solution, including sophisticated virtualization technology decisions. That means nothing other than that fewer servers more tasks by another computer in software after - they simulate the presence of additional computers.

So could the 66 previously used server through a single large computer to be replaced. The result: The capacity utilization increases, there is less energy wasted in idle. The Environment Ministry is now two identical machines running in parallel, so you have a readily available backup server should the primary machine fail - and still saves 40 percent energy costs.

Sounds like a success story and is also one so far but apparently the only computer in the park of the federal ministries - and probably just a drop in the ocean. Because, as it is indeed the energy needs of the ministerial computer systems are not even seem to know the federal government itself


The letter from the Interior Ministry to operate the various ministries a total of 107 data centers. Leaders here is under the Ministry of the Interior Wolfgang Schäuble with a total of 25 such large-scale computing systems. And the Ministry of Environment operates alongside its flagship computer still seems to be seven additional server installations.

It is interesting, however, an indication of the BMI, that "on the computing power of the respective" no data available and also not within "the answer for the time available" could be procured. After all, is promised to the Council of the IT Supervisor (IT Council) will in this medium, the current data reserved.


It consists of catching up?


Similarly, the response of BMI to the question of how many servers and PCs in the federal administration is currently used and how their number in the last ten years have changed. Even this was no data and should also help the IT Council gather information medium.

Has the Federal So in need of Green IT?

"Unfortunately it seems that the issue in the federal government still has not to be. The right of the Environment activities are against this background as an alibi event," says Angelika Brunkhorst to blogs ONLINE and advises the Minister that he should be the BMU-Brochure "Energy-efficient computing" to distribute his Cabinet colleagues.

This may be a bit far right. In fact, however, are measures to reduce the energy consumption of datacenters long ministerial decisions - only for their implementation, the authorities have plenty of time. Only until 2013, wants the IT Council, the power of the federal computer systems by 40 percent.


A year inventory


Initially, the company IT officers of the Federal or so, an inventory, ie precisely those figures compiled by the deputies at the Ministry of Interior Brunkhorst wanted to ask: How many computers are in use where, how much energy is needed for their operation?

It must figure out a very difficult and extensive task. Only at the end of 2009, the IT Council, a first comprehensive report on the energy consumption of IT in the Federal submitted. One might get the impression, since each machine individually durchgemessen.

ON TO ONLINE blogs

Cebit Conclusion: Guck mal, was da green (09.03.2009)

Change in the IT Industry: The Eco-Rechenzentrum (07.07.2007)

Data Marine: Google is planning eco-security in the sea (09.09.2008)

Airport-Computer: Frankfurt airport hidden brain (27.04.2008)

Coalition on environmental noise, "Economics Minister Guttenberg is wrong" (14.03.2009)

EU environmental debate: capitulation of climate-Chancellor (11.12.2008)

Only when this report is available, the Council's IT project officer appointed "Green IT" to act and can define what actions will be needed to realize the stated goals. These findings should then be in a Green IT competence to recommendations and guidance are summarized for the IT officers of the Ministries Council and to give assistance. Because a decision by the IT Council that is responsible for the implementation of the savings targets, the respective ministries.

Environment Minister Gabriel must still wait some time until in the federal ministries will be implemented, resulting
in the private sector has long been established: The use of environmentally-friendly computing benefits not only the climate but also the box office.

Monday, March 16, 2009

Robo Japan builds the model.

While people here even after Germanys Next Topmodel examined, it has already been found in Japan. The dream of the future wife there is 1.58 meters tall, weighs 43 pounds and needs above all one thing: A fully charged battery.

 


It is the star of future fashion shows will be her first public appearance is scheduled for next week. The name of the lady: HRP-4C. As this name suggests, is not a super model that his body daily in the gym or excess pounds steels abhungern need. HRP-4C is a robot woman, and must, if at all, no more than careful not too far from the nearest outlet to remove.


On Monday was HRP-4C at the National Institute of Advanced Industrial Science and Technology in Tokyo presented. The body of the electric catwalk miracle was silver and black colored plastic parts on a metal frame screwed together and should be the dimensions correspond to an average Japanese woman.

In particular, much effort is made so that their developers, HRP-4C the most attractive face. Visually oriented the technician is on the ideals of the Manga comics are specified: small nose, large eyes, pitch-black hair.


Electrical stage fright at the first appearance


Above all, they have tried, the Blechkameradin to a halfway credible mimicry to help. Around a quarter of over 40 engines from which to move their limbs, have been used for the face. The other is to ensure that the robots are equally elegant lady on the catwalk can run as their colleagues from flesh and blood. Approximately 200 million yen, almost 1.6 million euros, the development of HRP-4C tasted.

During the presentation of the electric models shown but then very quickly that the delicate electronics behind the pretty face is just slightly nervous, as some real model: When the present HRP-4C photographers with a flash thunderstorm exaggerated entglitten her facial features. Instead of smiling as ordered, they stared with open mouth against the surprise of the reporters.

Guilty of the misconduct was an overloading of the sensors for optical and acoustic signals, with the help of which the human machine is normally based. This error, however, researchers should quickly stop. Because if HRP-4C, 23 March the first time enters the catwalk to demonstrate new fashion, it should again in the spotlight of the photographers are.

Sunday, March 15, 2009

Brand Eigenbau clouds.

To an impressive cloud shape you need more than clouds filter. The trade magazine "DOCMA" shows three processes, the Do-it-yourself realistic clouds you.

 


Doc Bauman


The most credible cloud for montages are always real. The private archive of such documents can therefore not be large enough. Any time of day and cloud density, any type of weather there should be represented. Nevertheless, there are always situations where one's own cloud "build" would like.


FOUND IN ...

DOCMA 3 / 2009

Doc Baumanns magazine for digital imaging


Issue & Free Subscription
www.docma.info
DOCMA Award 2009 "image forgery"


We provide you three methods: The first uses real cloud structures as brush, the second involves the imitation of thick cumulonimbus, the third perspective fabricates correct veil clouds. The sky in the picture above, incidentally, is completely artificially created.

Friday, March 13, 2009

Is really really real?.

Who photographed, creating a snapshot of reality. Sounds plausible, but wrong, because acetic acid is indeed the reality only through the technical process of photography. How close to the original comes canned, examines the trade magazine "DOCMA".

 


DOCMA
Photographic style funds: More than a mere depiction of what we hold to the reality, far beyond

If you try, the reality of a photograph of manner, you have really made what. Because the camera is merely a device that helps to precisely this reality to be experienced and to preserve. This involves not just squeamish steps: First, the events separated by time factor.


FOUND IN ...

DOCMA 3 / 2009

Doc Baumanns magazine for digital imaging


Issue & Free Subscription
www.docma.info
DOCMA Award 2009 "image forgery"


The human perception is made up of countless small jumps of the eye together, called saccades. The brain synthesizes it into a continuous flow, a kind of film, time is an important criterion for the perception of facts. Accordingly, creative and varied are the ways of this important factor again in a photograph or a composing character.

But the processing of the perceived times, we should consider: It is true that the human eye, especially with the directly connected brain is a miracle thing, you think just consider the huge contrast range, which is managed or the huge depth of field, the available to us.

No wonder that the photographic technology since its inception tried in technical terms to the Biolinse heranzureichen: Panchromatic black and white film, then the ink, then the digital photography, the completely new ways of working or processing has brought. Since there is a surprising but even more so that in the nearly 180 years since the discovery of photography a lot of style funds have accumulated, with the depiction of reality little to do, but quite the contrary for its own, a photograph or Reality is even computer generated.


DIGITAL PICTURES WORLDS: NEW TEXTS PER RSS FEED

Digital imagery - photographic subjects on blogs ONLINE
Click on the icon, then your browser is usually linked to the RSS feed as well. Problems? Help ...
Or would you prefer via e-mail to be informed? Free email service with each new column to - how it works, click here ...
RSS feed of this column: http://www.blogs.de/netzwelt/tech/k- 7464.rss

That has consequences. In times when photography no longer preserve nature, but largely manipulator is used in addition to facts, and even feelings, dreams and all our consumerist-oriented living environment illustrated and transported, the stylistic devices used on a pure representation of what we to keep the reality, far beyond. Thus, the less obvious image montages meant that one more as a kind of closing date of the imagination of the author could describe, but the many little things that distinguish our viewing habits are constantly evolving.

What style of funds from the reality? What indulge their technical image? And why are different models in impeccable unapproachability rather than through their press by their appearance?

Thursday, March 12, 2009

The Shuffle can now speak.

Apple's new mini-music player is not just the smallest iPod, but also the first to speak. In 14 languages, he says in his songs. This compensates for Apple users, the lack of a display at the Shuffle.

 


The iPod's family has grown once again: the new Shuffle. The device is about as small as half a chewing gum strips (4.5 x 0.7 inches) and thus only half as large as its predecessor. His memory, four gigabytes (according to Apple). Serves the music player via a control element on earplugs cable, which unfortunately also means that you only use Apple headphones can.


In order for the absence of the display to compensate, Apple has the new feature integrates VoiceOver.

The new Shuffle can speak. He tells the user to the respective song. And because he speaks 14 different languages, an international music playlist with no obstacle for him. According to manufacturer information, the player automatically selects a language - you can change the language settings but also by changing iTunes.

Departure of the founding fathers.

Bill Gates has taken the leadership of Microsoft delivered, Steve Jobs is leaving Apple a piecemeal way. The charismatic founder generation of the PC era is starting, and successor of the same caliber is not in sight. If the computer is boring?

 


With ten authored Bill Gates already has a legally watertight contract that gives him five U.S. dollars for unlimited access to the baseball glove of his sister Kristi assured. At 14 he founded with his school friend Paul Allen, the company Traf-O-Data, and developed a computer system for traffic studies. Then Bill Gates has made Microsoft the largest software companies in the world and themselves to the richest man on the planet.

Getty Images
Bill Gates, Steve Jobs: Icons of the founding generation


Many saw in him an idol, an immensely successful programmers and entrepreneurs - the King of the Nerds, with the new digital machines requires. On 27 June 2008 Gates had the last working day in his company. In future he wants the whole with his wife founded Foundation devote to the health care and education projects in developing countries care.

Now, even Apple's Alpha-person Steve Jobs announced his withdrawal. At the beginning of the year, he had even his traditional Macworld Keynote-out, which from the Apple community as an annual mini-Woodstock was celebrated. By the summer jobs will relate solely to his health and his family take care.


FOUND IN ...

Technology Review

The M.I.T. - Magazine of Innovation

March 2009 Issue

Contents
Current Issue Order
Home Technology Review


After the official announcement of provisional broke off Apple's shares by almost ten percent. While Apple's shiny because economically, it touched on the idea that future nameless product manager with the fate of the company's attention to the cold touch of a sense of crisis not only exchange specialists, but also the community of Mac and iPod owners and other computer faiths. We experience a Götterdämmerung of the computer industry? What we lose with the sheen of the popular IT-pioneers and superstars? If the computer now ... boring?

©
Technology Review, Heise Zeitschriften Verlag, Hannover

Wednesday, March 11, 2009

Wants to be one-eyed into the camera head can be used.

Rob Spence has only one eye, the second, he wants to replace a camera, which in its empty eye socket will be used. His environment is scary - and this inspired the documentary: He is planning a film about the fear, to be watched.

 


A one-eyed documentary from Canada for his work has a whole new perspective found: For future recordings, he wants his camera in front of you no longer wear, but a miniature version in his eyes prosthesis can use. This will enable it to provide the world in the truest sense of the word with the eye of the observer noted how Rob Spence of these days at a conference on electronic media in Brussels said.

The tiny camera was originally developed for Darmblogsungen. The manufacturer OmniVision from California demonstrated by Spence's idea and adapted it for his project. They saw a good potential for the future, says product manager Zafer Zamboglu. Accordingly, it is undoubtedly a challenge, all electronic components in the camera so a glass eye to stow that outwardly nothing is visible.


The idea for the project came Spence claims to spontaneously when he was once the tiny camera on his mobile phone looked. The filmmaker was in the 70s a big fan of the U.S. series "The Six Million Dollar Man", which a decade later in the German television was to be seen. It has a man thanks to a costly operation after a plane crash on a bionic eye. This idea has Spence, whose right eye in a shooting accident in his childhood and damaged three years ago has been removed, never released.

"As a documentary filmmaker is looking for you so direct contact with people, on the one reported," he says. "And of course there is no better contact than just make eye contact." From this perspective, a documentary film to shoot, could virtually revolutionize the genre.


Documentation about the fear, to be watched


However, there are also ethical concerns. When the camera is in the eye really works, then it would be virtually Spence recordings at all times, without that his counterpart would be aware. This will be the eye of the beholder virtually spy warns Marc Rotenberg of the Washington Information Center for the protection of privacy in the electronic age. Many respondents agreed with Rotenberg agreed that they felt very uncomfortable at the thought that in this way to be watched.

Spence appeared on such concerns more surprised. The people would daily basis at all places of thousands of hidden cameras observed, but this seems less disturbing than the camera in his eye.

However, he admits that his friends and acquaintances are visibly nervous, the closer the project moves to its implementation. You would be afraid, ever to be filmed, and had been threatened, it will no longer want to take.

That is why Spence exactly these fears about its future documentation and make a film about the widespread surveillance systems rotate. He will be with the camera eye on the supervisor to monitor and respond to the question of search, "whether we are sleepwalking into a surveillance society, as in Orwell's novel'1984 'slip'.

The best photo backpacks.

In photo backpacks put even a few kilos of equipment for a few thousand euros - because the padding should be at least as good as the camera system. The trade magazine "Color Photo" has eight photo backpacks for small and medium-sized SLR equipment tested.

 


A photographer takes on not only his camera equipment, but also purses, keys, pen, sometimes the rain jacket, hat and gloves times or trunks - exactly what everyone else sometimes also with them.


Rotte Christian Egger
Fotorucksack: 100 euro cost of this model


What could be more than one all-rounder, who also acts as a photo backpack and standard serves to replace the second bag?

The photo-Fachmagazin "
Color Photo "has eight standard Combi models from 60 to 230 euros tested.


Rain, bumps, wet ground - "Color Photo" has getstet what the photo equipment backpack best protects, which is most pleasant to bear how fast the camera is at hand.

Tuesday, March 10, 2009

Compact camera shoot slow-motion videos for discounted price.

This camera breaks records: The slow-dwarf is the size of a cigarette pack and is 30 photos and HD video images per second. Is also amazingly small price: The photo should Flitzer to cost 260 euros.

 


A photographic camera, the 60 photos or 1200 video images per second shooting for just under 1000 Euros - that was a year ago, a damn good offer. At the time, Casio krempelte with his photo Flitzer
EX-F1 the market for high-speed cameras around. Until then, only very expensive professional cameras 10 or 15 photos in the second. Casios hobby model was six times as fast and much cheaper.


Now Casio goes a step further: The new, stripped down machine gun camera EX-FC100 is as small as a pack of cigarettes and currently costs 260 euros.



Photo: bac / SOE
Video: bac / SOE


The shirt pocket-clippers shoots up to 30 photos at a resolution of six megapixels per second and turns videos with 30 individual pictures per second in HD resolution and up to 1000 frames per second at reduced resolution arg.


Functionality, usability, image quality - the Casio FC100 Overview.

Software engineer promises Google-killer.

The Netzvordenker around the globe are in turmoil: The brilliant scientist Stephen Wolfram will replace, to break Google's omnipotence. He has a previously top secret software programmed - it can allegedly Want answers to specific questions.

 


This much is clear: Were it not about Stephen Wolfram, the fuss would be made since the weekend parts of the Internet, has changed less in size. A Google-killer wanted to build a lot - but he believed it to be.


Wolfram Alpha Home: "A new Paradigman for the use of computers and the Web"?


Wolfram was early as a child prodigy. He visited the British elite training facilities Eton and Oxford, at the California Institute of Technology, he made a doctorate in theoretical physics - he was 20 years old. There, he developed a forerunner of the software, which it later famous and probably quite well off, should - "Mathematica", up to now a standard tool for scientists and mathematicians, a kind of universal computer tool kit of mathematical models. Now send in tungsten, with a new, more complex piece of software is equal to an even greater revolution trigger.


"Cellular automata and Mathematica = Deep Thought?


"A new paradigm for the use of computers and the Web," says Wolfram even his project
in a blog entry. That sounds so full that one is suspicious - after all, many in the attempt failed, a more powerful universal answer machine as Google to build.

Fifty years ago, in the early days of computers that had been expected that machines will soon deal with all the might Wolfram writes: "The fact that the computer is only a matter would have to make, and it can calculate the answer. But this did not happen. " Well, believe it, either one at a point at which this promise was finally einzulösen. The combination of Mathematica and its theories of basal, basic programs, which he called "cellular automata" is called. With a book on this topic
"A New Kind of Science" (read online) made of tungsten Furore 2002, far beyond the world of mathematics and natural sciences also.


"Wolfram Alpha" is now called the tool, the website where you will be able to use it, is already online - but without function. In May will be the change, and one can assume that in the Googleplex in Mountain View with great interest test is whether the job actually works. Because tungsten Alpha is much of what Google does - only better.

Questions that, in natural language. With the answers, not lists of possible locations are, where you could find the answer, but simply the most sought-fact. A "computational knowledge engine" that Wolfram calls a "calculating machine knowledge" to some extent. Developed in the course of years, with a team of approximately 100 employees allegedly. The developer even considers the whole thing quite as Work in Progress: Just like Mathematica Wolfram Alpha will also probably never completely finished.


"Wolfram Alpha calculates the answers"


A search engine in the conventional sense is unlikely Wolfram Alpha. The Web Entrepreneur Nova Spivack has been the prototype may view, describes the tool first time by process of elimination: "It raises not just documents that may contain the answer, such as Google, and it is not just a huge knowledge base like Wikipedia. It understands not only natural language, and uses this ability to find documents, such as Powerset. "

No, writes
Spivack in a long, almost reverent blog entry, "Wolfram Alpha calculates the answers to a wide range of issues." Spivack has founded numerous companies - and he is expert on the semantic Web, one of the existing approaches to the unresolved questions in a smarter network exactly knows. His company, "Twins" will also be a smarter network, albeit with a completely different approach, a social.

YOUR OPINION IS ASKED

Discuss about this article


Calculate but Wolfram is alpha the crucial keyword. There is the meager information available indicates that so far, in three parts: one giant database, a huge collection of algorithms and a translator of linguistically formulated questions makes computing tasks that the algorithms have access to the database can be solved. This database is factual information about the world on scientific models and relationships, about cooking and music, geography and technology and many other zones.

None Webcrawler together with the required information but, as Wolfram writes, "curated" data, and "trillions" of it. Curated means Wolframs team has selected the records, their sources as reliable. Be it stocks, geographical coordinates or information about the human genome.


"Extremely impressive and thorough answers"


"Wolfram is alpha, as if you are in a huge electronic brain einstöpselt," said Nova Spivack after his first trial. It will deliver "extremely impressive and thorough answers to a wide range of issues in many different ways asked." And this answer would also be calculated, "not simply in a large database for beaten." The connection to the Web would come only in a further step - in addition to the responses of the system could be presented to links, such as the corresponding Wikipedia entry or technical publications on the topic.

The responses were, however, extremely detailed graphics and enriched with partially so thorough, so comprehensive, "that you would need a university degree in order to fully understand," restricts Spivack A. "It was designed by and for people with intelligence quotients in the region of tungsten constructed - it will take some work put into it have to be a few hundred stupid points to make to the average consumer not to overwhelm."

The creator of thinking, the nature differently. The system will be finished tungsten his blog entry, "us almost to the point to which people have thought 50 years ago that computers would reach him."

In May, you can guess whether he is right.

Monday, March 9, 2009

Guck mal, was da green.

PCs that do not consume electricity, computing, the Internet in green - and displays, the more colors from less watts magic. Environmental protection and energy-saving technology as early as 2008 had a trend of Cebit, but this time finally felt good for consumers.

 


Can you explain the concept Webciety? Not? Pity, finally, the Fair Webciety on the Cebit 2009 explained. She has not explained, however, how Webciety in a few words will explain. As it has with the previous year's theme Green IT already lighter. The aim is to minimize power consumption and high-tech equipment to produce more environmentally friendly.


DPA
Fair visitors at the CeBIT: 2009 was finally really green


Green IT was the Cebit 2008. At the time, but banished the Deutsche Messe Hannover exhibition area to the exhibition topic in the far corner on the edge of the fairgrounds housed hall. After some criticism of this concept,
of blogs online, you wanted this year better.

Instead, as 2008, a "Green IT Village" at the fair to place, was also a "Green IT World" was proclaimed. And were the generous space 2000 square meters in hall 8 disclosure. In the hall were pretty green companies, associations and ministries, as they are a greener future computer imagine what they will contribute, and how we can help set.

Even more than on this island of professing Stromsparen could, however, rest on the fairgrounds to see how much environmental thinking in concrete products materialize.

That they do not, because companies and engineers handlebars suddenly committed environmentalists mutant, showed the electronics company LG Electronics with a specially commissioned study. Their result: The energy consumption of electronic devices by consumers is now seen as an important buying criterion. And not just from those. Even the buyers of large entrepreneurs increasingly on the power of their purchases, because the often make a huge share of the operating costs of firms.


Super Savings PCs, 0-watt chargers and lean computing: Read the following pages, such as the computer world itself greenery.

iPod-operation with a smile.

He reads the user wishes come true: A Japanese researchers developed the so-called ears switch allows iPod, washing machine or ceiling lamp with a twitching of the eyebrow to use - or the emergence of the tongue routes.

 


Eyebrow raise: music is louder. Wink: Dishwasher starts Schleudergang. Frown: The TV goes on.


AFP
Mimi-switch in action: Forward with herausgestreckter tongue


Either way could be similar to the operation of electrical and electronic equipment in the future, if really works, what Japanese researchers have now presented: The "Mimi Switch aims to capture the user's facial expressions and facial expressions to translate commands. It would be "the room lighting or washing machine with a rapid twitching of the mouth angle turn" may, promises Kazuhiro Taniguchi of Osaka University in Japan.

Following the descriptions, which Taniguchi else for his invention has invented, could be the Mimi switch users to the general public, however, cause some consternation: "An iPod can play the music start or stop if the carrier herausstreckt how his tongue on the famous picture of Einstein. Who is he tearing open his eyes wide, the machine jumps to the next song. A twinkle with the right eye makes them jump back. "


"Naserümpfen or smile"


The Mimi-Switch, the inventor of the "ears switch" is called, looks like a normal headset. It is equipped with infrared sensors, the tiny movements of the ear to be measured with different facial expressions accompany. The device can be programmed "and other facial expressions like a smile or a Naserümpfen" to grasp, says Taniguchi.

The remote control is also its users over time getting better acquainted, by storing and analyzing data: "The switch to monitor natural movements of the face in everyday life," said Taniguchi. Something seems scary at that desk in the ears of the doubt sometimes should intervene: "If he finds that you do not smile enough, maybe he plays a happy song off."

The inventor expects the freehand remote life easier - you can order such a book and read simultaneously, without the hands on help of the accompanying music to change. But it could also lead to more serious tasks, such as in connection with a hearing aid in older people: "It could determine how often they sneeze, or if they regularly eat," Taniguchi hopes, "if it believes that they are not good goes, it could be a warning to relatives to you. "

Moreover, and this is probably the most likely first application, the device should ever be produced in series, the ears could switch disabled people in everyday life help - such as this, household appliances to operate.

The predecessor of the ears circuit breaker, to a pair of glasses attached, and the movements of the eyelids recorded, incidentally, was not a breakthrough success. But the ears switch was less prone to error than the "Temple Switch", "because its optical sensors are not affected by sunlight," said Taniguchi. He wanted the patented device can now begin. The practical application, but will probably still two to three years.

Sunday, March 8, 2009

Fewer visitors, more exciting ideas.

Around 20 percent, the number of visitors to Cebit fallen, even with the exhibitors, there was a sharp decline - still holds the organizer of the exhibition a success. Companies have taken new courage and Hanover with full order books to leave.

 


What were the periods when it at the Cebit in certain halls reinkam not anymore! The crowd in the corridors was so great that people with claustrophobia only the width could search. The golden age for the Cebit, however, are long gone. For years, falling visitor and exhibitor numbers. And this trend is 2009, the year of the global economic crisis, exacerbated.


20 percent fewer visitors, reported by Deutsche Messe AG. Instead 495,000 arrived last year as this year only 400,000, said the Cebit Board of Deutsche Messe AG, Ernst Raue. The exhibitor numbers (4300, represents a decrease of 25 per cent) and the rented exhibition space (200,000, equivalent to minus 20 percent) declined.

Raue was nevertheless satisfied with the course of the fair. "A large part of the 4300 companies from 69 countries, at the Cebit take new courage," he said. Many exhibitors and visitors leaving Hanover with new hope, full order books and a solid base for new business. "

Raue said, with a view to the fairgrounds on the application shown by an "innovative, fair break." It should have been sold well, Raue said, adding: "The Cebit killer may act as a crisis."

In fact, surprised that it
at the Cebit abnormally reduced many new impulses to see there. Among the attractions of the Cebit this year included digital readers - also known as E-Book. At the fair
A German company has a Linux reader to the Kindle, Sony and Co. will be competing.

German Chancellor Angela Merkel (CDU), had the show on Monday night officially opened. At the start of the fair was also the governor of this Cebit partner country of California, Arnold Schwarzenegger, in the Lower Saxony state capital has come --
for some visitors to the actual climax of the show. The Cebit 2010, one day will be shortened.

San Francisco surfing into the office.

Congestion, stress, hours-long trips - for the commuters of the Silicon Valley is no longer a problem. A new high-tech network of biofuel buses offer wireless Internet, laptop connections and a café latte. The very best in the Revolution: At last, the nerds already on the way into the office to work!

 


Outside San Francisco's skyline attracts over - inside the e-mails and messages.

On the trip to Silicon Valley knautschen people in black leather seats. Connect to laptop power sockets in the Busarmatur to. Check Web sites. Sign in via Virtual Private Network (VPN,
more knowledge on blogs ...) in the network of their company - and sometimes begin to work on.


Work with a difference: three wireless network bus routes since last week from San Francisco to Silicon Valley tech kingdoms such as San Jose, Sunnyvale or Mountain View. -Up with wireless LAN, cable television and an on-board service, café latte, muffins and yogurt with fresh fruit enough to combine the bus and technological Machbarkeitswahn Californian eco-attitude. The wireless network will be tech commuters to move from car to more environmentally friendly transport switch.

Neil DSouza, 24, is among the first guests in the new nerd-luxury liner. He is a programmer at the IT giant Cisco in San Jose. But in Silicon Valley where he will not live. His apartment is located in approximately 60 kilometers from San Francisco. Like most people who work in the Valley, he must commute.

The new bus line keeps it an attractive alternative to the car: "The time that I otherwise sitting behind the steering wheel, I can now use productively," says DSouza. Only newspaper to read and listen to music never gave him an incentive for bus drivers - but now he can surf the net.

Slightly more than one hour to drive from San Francisco to the Valley. "We give the commuters every week, ten hours of their life back," says Gary Bauer, the bus operator and CEO of the company's Intelligent Transportation Bauer. The time saved is not exactly cheap. $ 8.20 cost of a ride in a luxury liner Nerd.


New law fired creative eco-projects


ON THE INTERNET

Transit: Mobile wireless network projects

Parvus.com: Information about Ridernet

blogs ONLINE is not responsible for the content of external internet sites.

DSouza, however, the most of it not even pay for it. Because a new environmental regulation in the greater San Francisco requires companies with more than 20 employees since January that its employees to use public transport to compensate - or their own shuttle services. To pay for Cisco Dsouzas ticket.

Previously calculated the Wi-buses only as a private shuttle service for IT giants. Chauffeur companies like Google with them for quite some time its own personnel to work. Gary Bauer hopes the commuter transportation by the new environmental regulation as a public transport works. For commercial success, further lines are planned.

The wireless network drive buses with biodiesel. Had the three lines twice daily, each with 52 guests busy, would annually 1310 tonnes less carbon dioxide into the atmosphere gepustet, Bauer has entrepreneurs specifically. His company prides itself to be 96 per cent CO2-neutral to be: As compensation for its own Kohlendioxidausstöße the company buys green electricity certificates (RECS), which renewable energy should be promoted.


Bauer's attitude is symptomatic of the well of U.S. President Barack Obama called for eco-revolution. Again and again, the new government has stressed that the 787-billion-dollar economic package of green technologies. It has been estimated that at least 38 billion U.S. dollars to promote energy efficient technologies, plus up to another 20 billion U.S. dollars in tax relief over the next ten years. The so-called Green Tech is considered one of the next big growth markets - and the Silicon Valley as a creative forge their business models.

Since Obama is President, and in the greater San Francisco new environmental laws, is the climate for entrepreneurs like Gary Bauer favorable. A new boom times as dotcom bubble awaits the entrepreneur but not - "the face of the greatest economic crisis since the Second World War is far greater selection pressure," he says. "It is probably not a new startup Schwemme give."


Stable network by spreading data


Crackles rain on the roof of the black tech shuttle. About a remote mountain stops milky-yellow sunlight through the dark gray clouds wall. With 70 miles per hour schliddert Wi bus klatsch ate at the 101-Highway to the south. The wireless connection purrs stable at 24 Mbits per second. Astonishing how this actually works?

While the Wi-bus from right out of a pickup, is an Internet search on the web page of the company Parvus that the wireless technology of Wi-bus bears the name Ridernet - and also at the Massachusetts Bay
trains will be used there, too, with the aim of travel on public transport more attractive. The Ridernet service uses to obtain the Internet connection a variant of the so-called EVDO technology.

EVDO stands for Evolution-Data Optimized. Grob says allows the transmission of Internet data, inter alia, via radio signal. The signal is spread over a larger bandwidth spread and is therefore less susceptible to interfering.

Indeed, the Internet reception on board even better than the TV signal. The CNN round table discussion in the bus on six flat screens flickering, always tear off. "We live in a Facebook world," screeches there just a talk show host, from the stuttering reception will be interrupted. "In a world of Twitter! One American Idol world, but we also live in the real world. You do not forget!"

For a brief moment mustered DSouza provoking the monitor, then he would rather look back on the laptop and programmed to code.